Two V Teamers Working With Boston Dynamics Robot Dog

Cybersecurity

Sr Mgr-Security Engrg

  • Hyderabad, India
  • Chennai, India

Job ID: R-1085292

Apply prior to the end date: September 30th, 2025

When you join Verizon

You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife.

What you’ll be doing...

The Verizon Cyber Security (VCS) organization securely enables the business by protecting assets and information across Verizon networks, infrastructure and applications. VCS integrates cybersecurity governance, policies, technologies and operations across Verizon, and works to incorporate security into the design of technology systems and services.

Verizon is looking for an innovative and self-driven leader with experience overseeing the Content Development Engineering OR Threat Hunt teams in Verizon India. In this role, you will be responsible for managing CDE & Threat Hunt teams. You will work closely with the Security Operations Center (SOC) to develop and manage contents built to identify anomaly activities that will be monitored and responded to by the SOC Analysts. In addition, you will be leading the Threat Hunt team that is focused on identifying and neutralizing threats through proactive hunting and detection, improve incident response and mitigation strategies, and ensure continuous operations to safeguard Verizon from current and future cyber threats. The Senior Manager, CDE/TH plays a critical role in Verizon’s Cyber Defense program and is a thoughtful leader willing to mentor and advise others, and drive the operational and strategic growth of the organization.

  • Leading the critical components of the Content Development & Threat Hunt programs.

  • Overseeing the day-to-day activities of the Content Team, which includes

    • Supporting, developing, executing testing of new content rules,

    • Creating signature, behavioral, and statistical content for the Threat Management Centre (TMC) SOC

    • Adding, changing, and removing rules

  • Documenting additions, deletions, and modifications of content rules.

  • Producing and updating all ‘content’ related information in the SIEM Platform.

  • Maintaining direct and regular interaction with the TMC-SOC and organizational stakeholders to enhance content across the platforms, and mature the security program, based on risk posture, threat landscape, and changing business requirements.

  • Developing and delivering regular training sessions for the TMC-SOC on content

  • Leading "hunt missions" using threat intelligence, data from multiple sources and results of brainstorming sessions to discover evidence of threats, insider misconduct, or anomalous behavior

  • Utilizing advanced threat hunting techniques and tools to detect, analyze, and respond to anomalous activities. This includes Identifying threat actor groups and characterizing suspicious behaviors as well as being able to identify traits, C2, and develop network and host-based IOCs or IOAs

  • Evaluating and making recommendations on security tools and technologies needed to analyze potential threats to determine impact, scope, and recovery. 

  • Ensuring gaps in detections are socialized with Cyber Security stakeholders; this includes identifying dependencies, recommendations, and collaborating to mitigate threats

  • Participating in Purple Team, Threat Hunt, and tabletop exercises.

  • Working closely with key cross-functional stakeholders to develop and utilize proactive and mitigating measures to prevent, detect and respond to potential threats to Verizon on prem and cloud environments. 

  • Presenting executive-level operational read-outs, metrics, and case reviews that accurately capture the effectiveness of the threat hunt team. This includes leveraging internal data, threat trends, and operational metrics to clearly communicate the Verizon landscape to senior executives, to include the Chief Information Security Officer.

  • Developing and executing long-term and short-term strategic goals and ensuring proper updates are socialized to appropriate stakeholders. 

  • Mentoring and advising team members by educating them on advanced techniques to help drive the operational and strategic growth of the organization. 

  • Promoting an environment of collaboration and individual accountability when it comes to problem-solving, decision-making, and process improvements

  • Attracting, retaining, and leading a team of employees by educating, developing and managing them to deliver strong results.

  • Conducting team performance management activities including goal setting, conducting reviews, check-ins and disciplinary action, as needed

What we’re looking for..

You’ll need to have:

  • Bachelor’s degree or four or more years of work experience. 

  • Six or more years of relevant work experience.

  • Two or more years of people management experience.

  • Two or more years of experience in cyber security at a large company.

  • Experience with development of content, ingestion of feeds, and/or other platform administration functions

  • Two or more years of experience in cybersecurity, with a focus on threat hunting, cloud security (AWS, GCP, Azure, OCI), and incident response
     

Even better if you have one or more of the following:

  • A bachelor's in Computer Science or Information Security

  • Demonstrated experience as a key member of a security operations team (SOC, Incident Response, Threat Intel, Malware Analysis, IDS/IPS Analysis, etc.)

  • Comprehensive knowledge utilizing system, cloud, application and network logs.

  • High-level understanding of Operating Systems: Windows, Unix/Linux, and OSX Operating Systems in support of identifying security incidents.

  • Experience in the YARA

  • Hands on experience with Looker

  • Experience in adversary simulation and MITRE ATT&CK

Where you’ll be working

In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager.

Scheduled Weekly Hours

40

Equal Employment Opportunity

Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics.


Group Of Verizon Employees Posing Together

Stay in touch.

Even if you’re not a V Teamer (yet), we’d love to keep you in the loop. We can’t help it—connection is kind of our thing. So be sure to sign up to become part of our network.

Join our talent network